Completed
Using the Registry-Key Persistence Module
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Windows Red Team Persistence Techniques - Red Team Series
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What We’ll Be Covering
- 3 What is Persistence?
- 4 Mitre Attack Techniques - Persistence
- 5 Empire Persistence Modules
- 6 Let’s Get Started
- 7 Recap of Some Starkiller Features
- 8 Renaming Agents
- 9 Unprivileged vs Privileged Agents
- 10 Creating a an Additional Privileged Agent
- 11 Beginning our Persistence Techniques
- 12 Using the Registry-Key Persistence Module
- 13 Using the Scheduled Tasks Persistence Module
- 14 Using the WMI Persistence Module
- 15 Using Local User Accounts as a Means of Persistence
- 16 Using the PowerBreach Module to create a Backdoor
- 17 Checking if our Agents are Pinging Back
- 18 Conclusion